Systems and methods for implementing a Transport I/O system are described. Network encrypted content may be received by a device. The device may provide the network encrypted content to a secure processor, such as, for example, a smart card. The secure processor obtains a network control word that may be used to decrypt the network encrypted content. The secure processor may decrypt the network encrypted content to produce clear content. In embodiments, the secure processor may then use a local control word to generate locally encrypted content specific to the device. The device may then receive the locally encrypted content from the secure processor and proceed to decrypt the locally encrypted content using a shared local encryption key. The Transport I/O system ensures the protection of the network control word by maintaining the network control word on the secure processor.

Patent
   10070176
Priority
Mar 13 2013
Filed
Sep 29 2014
Issued
Sep 04 2018
Expiry
Mar 13 2033
Assg.orig
Entity
Large
1
590
currently ok
10. A method comprising:
receiving, at a removable secure device, data from a host device, wherein the secure device is operable to be physically coupled to the host device, and wherein the secure device is capable of operating in an ISO-7816 compliant legacy mode;
storing the received data in a buffer resident on the removable secure device;
monitoring the buffer using the secure device;
determining whether a number of packets queued in the buffer is below a threshold value; and
when the number of packets queued in the buffer is below the threshold value, sending a signal to trigger the receipt of additional data packets from the host device.
18. A computer storage medium comprising computer executable instructions that, when executed by at least one processor, perform a method comprising:
receiving, at a removable secure device, data from a host device, wherein the secure device is operable to be physically coupled to the host device, and wherein the secure device is capable of operating in an ISO-7816 compliant legacy mode;
storing the received data in a buffer resident on the removable secure device;
monitoring the buffer using the secure device;
determining whether a number of packets queued in the buffer fall below a threshold value; and
when the number of packets queued in the buffer fall below the threshold value, sending a signal to trigger the receipt of additional data packets from the host device.
1. A removable secure device comprising:
at least one processor; and
memory encoding computer executable instructions that, when executed by the at least one processor, perform a method comprising:
receiving data from a host device, wherein the removable secure device is operable to be physically coupled to the host device, and wherein the removable secure device is capable of operating in an ISO-7816 compliant legacy mode;
storing the received data in a buffer resident on the removable secure device;
monitoring the buffer using the removable secure device;
determining whether a number of packets queued in the buffer is below a threshold; and
when the number of packets queued in the buffer is below the threshold, sending a signal to trigger the receipt of additional data packets from the host device.
2. The removable secure device of claim 1, wherein the removable secure device operates in a variable bandwidth environment.
3. The removable secure device of claim 1, wherein the buffer is a FIFO buffer.
4. The removable secure device of claim 1, wherein the signal is a clear to send (CTS) signal.
5. The removable secure device of claim 4, wherein the CTS signal is sent to the host device.
6. The removable secure device of claim 5, wherein the host device is a set-top-box.
7. The removable secure device of claim 6, wherein the method further comprises in response to sending the CTS signal, receiving at least one packet of interest.
8. The removable secure device of claim 7, wherein the packet of interest comprises at least one of transmission data and control data.
9. The removable secure device of claim 1, wherein the removable secure device is a smart card.
11. The method of claim 10, wherein the threshold value is based on a processing time for packets in the buffer.
12. The method of claim 10, wherein the host device is a video processing device.
13. The method of claim 10, wherein the host device is a set-top-box.
14. The method of claim 13, wherein the removable secure device is a smart card.
15. The method of claim 10, wherein the buffer is a FIFO buffer.
16. The method of claim 10, wherein the signal is a clear to send (CTS) signal.
17. The method of claim 10, wherein the CTS signal is sent to the host device.
19. The computer storage medium of claim 18, wherein the host device is a set-top-box.
20. The computer storage medium of claim 9, wherein the removable secure device is a smart card.

This application is a divisional of pending U.S. patent application Ser. No. 13/799,891, filed Mar. 13, 2013 and entitled, “SYSTEMS AND METHODS FOR PERFORMING TRANSPORT I/O,” now issued U.S. Pat. No. 9,888,283, which application is hereby incorporated by reference in its entirety.

Digital Video Broadcasting (DVB) is an internationally recognized standard for transmitting digital television over cable, satellite, and other transmission mediums. A weakness of the DVB architecture is that the network control word used to decrypt content is easily shared over the Internet allowing non-subscribers access to broadcasted content. It is with respect to this general environment that embodiments of the present invention have been contemplated.

Embodiments of the present disclosure relate to systems and methods to access content using a Transport I/O system. In embodiments, a secure processor receives network encrypted content. The secure processor may decrypt the network encrypted content using a network control word. In such embodiments, the network control word never leaves the secure processor and, thus, is protected from interception by an unauthorized user.

In further embodiments, after decrypting the network encrypted content, the secure processor may re-encrypt the content using a local control word to produce locally encrypted content. The locally encrypted content may be uniquely encrypted for a specific device such as, for example, a set-top-box, a system on a chip, or any other type of device capable of receiving and modifying content. In embodiments, the secure processor provides the locally encrypted content to the device.

The device may receive the locally encrypted content and obtain the local control word. Using the local control word, the device may decrypt the locally encrypted content to produce clear content. The clear content may be processed by the device. For example, the device may display the content or store the content for later use.

This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.

The same number represents the same element or same type of element in all drawings.

FIG. 1 illustrates a communications system 100 that may be employed with a Transport I/O system to protect content.

FIG. 2 is a flowchart representing an embodiment of a method 200 of performing network content decryption.

FIG. 3 is an embodiment of a method 300 for processing locally encrypted content.

FIG. 4 is an embodiment of a method 400 for receiving and processing protected content using a Transport I/O system.

FIG. 5 is an embodiment of a method 500 that may be employed to reset functionality of a secure device.

FIG. 6 is an embodiment of a packet pacing method 600.

FIG. 7 is an embodiment illustrating the compatibility between an ISO-7816 smart card and a smart card capable of supporting the systems and methods disclosed herein.

FIG. 8 is an embodiment of a secure processing device 800 that may be employed with the systems or to perform the methods disclosed herein.

FIG. 9 is an embodiment of a set-top-box that may be used to perform the Transport I/O system methods and be part of the systems disclosed herein.

FIG. 10 illustrates an embodiment of a computer environment and computer system 1000 for implementing the systems and methods disclosed herein.

The various embodiments described herein generally provide systems and methods for protecting streamed content by employing a Transport I/O system. In embodiments, a Transport I/O system can be employed to decrypt content, such as, but not limited to, a network broadcast stream without exposing a network encryption key to an unauthorized party. For example, in an embodiment where a Transport I/O system is operating in a Digital Video Broadcasting environment, a Transport I/O system may maintain a control word on a smart card and use the control word to decrypt a network broadcast on the smart card, rather than providing a decrypted control word to a descrambler that is not part of the smart card. In other embodiments, a Transport I/O system may protect a control word from exposure by applying additional encryption to a control word, securely communicating a control word to another component, etc. One of skill in the art will appreciate that any other means of reducing the risk of exposure of a control word or control words may be employed by a Transport I/O system.

In embodiments, the systems and methods disclosed herein may be practiced in a Digital Video Broadcasting (DVB) compliant system. DVB is a set of internationally accepted open standards for broadcasting digital television. The DVB standards define both the physical layer and the data link layer of a distributed system. There are DVB standards defining the distribution of content over various different mediums. For example, satellite transmissions are defined in the DVB-S, DVB-S2, and DVB-SH specifications. Cable transmission is defined in the DVB-C and DVB-C2 specifications. Terrestrial television transmission is defined in the DVB-T and DVB-T2 specifications for standard television formats and DVB-H and DVB-H2 for the transmission of mobile television, e.g., television for handheld devices such as mobile phones. Microwave transmission is defined in the DVB-MT, DVB-MC, and DVB-MS standards.

In addition to defining the physical and data link layers, the DVB suite of standards includes standards that are used to provide conditional access protection of the transmitted content. Examples include the DVB-CA, DVB-CSA, and DVB-CI standards. Conditional access is a method of protecting content by requiring a device to meet certain criteria before it accesses content. Conditional access plays an important role in ensuring that broadcasted content is made available only to subscribers of a particular broadcast system (e.g., cable and satellite customers, etc.). The general architecture uses a global key, called a network control word (NCW), for performing conditional access. One or more NCW's are used to encrypt data before it is broadcast to subscribers. The NCW's are transmitted by a head-end (e.g., a satellite or cable provider) to subscriber devices in an entitlement control message (ECM). The ECM is generally encrypted before transmission to the subscriber device. The conditional access system of the subscriber devices (e.g., a smart card or other conditional access module whether in hardware or software) decrypts the ECM using information received in an entitlement management message (EMM) transmitted from the head-end. The subscriber device can then use the NCW's to decrypt the content broadcast by the head-end. Generally, a NCW is used for a certain period of time, or a crypto period. Upon expiration of a crypto period a new crypto period begins. The head-end may then transmit a new NCW to a subscriber device(s) and proceed to use the new NCW to encrypt the broadcast content.

One of the main weaknesses of the DVB conditional access architecture is that a NCW can be decrypted and easily shared over the Internet. Because the content is broadcast to many users, the content must be encrypted with the same key (e.g., same network control word) for every subscriber. Thus, once the network control word is discovered, any unauthorized user (e.g., a non-subscriber) with access to the network may use the network control word to decrypt the broadcast content. Generally, the NCW's consists of eight (8) bytes. The duration of a crypto period usually varies between five (5) to sixty (60) seconds. Thus, a non-subscriber may defeat the DVB conditional access architecture based upon the discovery of the eight (8) byte NCW, a task which may be accomplished within the duration of a typical crypto period. Generally, after the NCW is obtained by the smart card the smart card provides the NCW to an external device or component. The external device or component uses the NCW to decrypt the broadcast content. However, the NCW may be intercepted and shared with others, thereby allowing unauthorized sharing of the content.

While the present disclosure describes the Transport I/O system as a solution to the shortcomings of DVB conditional access, one of skill in the art will appreciate that the methods and systems disclosed herein can be practiced to protect content in other types of data transmission streaming and/or broadcasting that are not compliant with the DVB architecture such as, but not limited to, streaming media over the Internet. The systems and methods disclosed herein with respect to the Transport I/O system will now be discussed in detail with respect to the accompanying figures.

FIG. 1 illustrates a communications system 100 that may be employed with a Transport I/O system to protect content. The communications system includes a head-end device 102 that receives content from content providers 104 and distributes the content across a communication network 106 to various recipient devices 108. The recipient devices can access the content and display it to a user. A single recipient device 108 can be any device capable of receiving and decoding a data transmission stream over communication network 106. Such devices include, but are not limited to, mobile phones, smart phones, personal digital assistants (PDAs), satellite or cable set-top-boxes, desktop computers, laptop computers, tablet computers, televisions, radios, a video processing device, or any other device known to the art. In embodiments, recipient devices 108 of subscribers are generally able to access the encryption key used to decrypt the content, while non-subscribers are not able to access the encryption key without circumventing the security measures employed by the head-end device 102 broadcasting the content over the communication network 106.

In embodiments, the head-end 102 may be a distribution point of a cable television provider, the distribution of point of a satellite television provider (e.g., a satellite), a terrestrial wireless network, a server broadcasting content over the Internet, or any type of device capable of distributing content over a communications network. One of skill in the art will appreciate that the head-end device 102 may be any type of device, or a collection of devices (as the case may be), that are capable of receiving, encrypting, and broadcasting content over a network.

In one embodiment, the content broadcast over communications system 100 may be generated by the head-end device 102. In other embodiments, the head-end device 102 may receive content from one or more content providers 104. In such embodiments, the head-end device 102 is in electrical communication with one or more content providers 104. For example, a content provider may be a cable, terrestrial, or satellite television station that transmits content to the head-end device 102 over a wired (e.g., cable, fiber optic, or Internet connection) or wireless connection (e.g., via radio, microwave, or satellite communications). In other embodiments, the content may reside in a datastore that is in electrical communication with the head-end device 102. While FIG. 1 depicts the content providers 104 as being separate entities from the head-end device 102, in other embodiments, the content providers 104 and head-end device 102 may be a single entity.

The head-end device 102 is tasked with distributing the content over a communication network 106 to various recipient devices 108. In embodiments, the communication network 106 may be the Internet, a cable network, a fiber optic network, a satellite communications network, a terrestrial broadcasting network (e.g., networks communicating over radio or microwave transmission mediums), a cellular data network, a wide area network (WAN), a local area network (LAN), a plain old telephone service (POTS) network, the Internet, or any other type of communication network capable of streaming, broadcasting, and/or otherwise facilitating data transmissions between various devices. One of skill in the art will appreciate that the systems and methods disclosed herein can be practiced regardless of the type of communication network used to transmit data between devices. In many cases, the head-end device 102 may broadcast the content in a data transmission stream over the communications network rather than sending content to a particular device. Because the content is being broadcast over the communication network 106, the transmission can be received by any number of devices capable of interacting with the communication network 106. In order to prevent unauthorized users from accessing the broadcasted data transmission stream, the head-end device 102 encrypts the data transmission stream before it is broadcast over the communication network 106. Because the network broadcasted content is made available to multiple devices, a common encryption key (e.g., a network control word) may be used to encrypt the network broadcasted content (e.g., network encrypted content). In embodiments, the network broadcast content may be a network encrypted stream that includes content, such as network encrypted content, and data. In embodiments, the data contain information about the stream such as, but not limited to, encryption information, timing information, compression information, or any other type of information. Although not illustrated in FIG. 1 the communication network may also be used to perform two-way communication between the head-end device 102 and the recipient device or devices 108.

In embodiments, the data transmission stream is encrypted using a one or more keys, such as, but not limited to, a network control work (NCW). The NCW may be used to encrypt the data transmission stream for a certain amount of time (e.g., a crypto period) thereby resulting in the creation of network encrypted content. In embodiments, network encrypted content may be encrypted using a common key (e.g., an NCW) such that the network encrypted content can be decrypted by authorized users (e.g., subscribers). The NCW is shared between head-end device 102 and the various recipient device or devices 108. In one embodiment, communication system 100 may operate according to the DVB architecture. In such embodiments, the NCW may be a control word (CW) that acts as the key used in encrypting the content. In such environment, the head-end 102 may periodically transmit the NCW to the various subscriber devices using an ECM message. Additionally, the head-end 102 transmits an EMM message to the various subscribers which contains information necessary to decrypt the ECM and retrieve the NCW. In such embodiments, the EMM may be decrypted by a secure device or processor, such as a smart card that is part of or connected to the recipient device to retrieve the NCW. The smart card may then provide the NCW to another component that is part of or in communication with the recipient device to decrypt the content. However, once the NCW is sent from the secure device and/or processor, the CW may be intercepted and shared with others to provide unauthorized access to the content.

In embodiments, the Transport I/O system solves this problem by maintaining the decrypted control word in a secure processing device (e.g., on a smart card, secure processor, secure memory, or any other secure device or secure component of a device). In such embodiments, the decrypted CW is maintained on the secure device, thereby preventing the interception and sharing of the CW. In such embodiments, the secure content (e.g., an encrypted broadcast or encrypted content) may be decrypted on the secure processing device. The secure processing device may then provide the clear content (e.g., decrypted content). While the clear content may be intercepted and shared, it may not be as easy to share the content due to the size of the content and the bandwidth required to share the content. In another embodiment, the secure processing device may uniquely encrypt the content for use by a specific device (e.g., a recipient device 108). For example, in such embodiments a method utilizing a local encryption key, or local control word (LCW), may be used to create locally encrypted content. The local control word may be unique to a local device. The secure processor or secure processing device may then provide the locally encrypted content to the local device. Furthermore, in embodiments, the locally encrypted content may be uniquely encrypted for a specific device such as, for example, a set-top-box, a system on a chip, or any other type of device capable of receiving and modifying content.

FIG. 2 is a flowchart representing an embodiment of a method 200 of performing network content decryption. In embodiments, the method 200 may be performed by a secure device or a secure processor. An example of a secure device is a smart card. Flow begins at operation 202 where the network encrypted content is received by the secure device. In embodiments, network secure content may be content encrypted using a NCW. The NCW may be a common control word or encryption key that is used to encrypt and decrypt content sent to multiple users or subscribers. In one embodiment, the network encrypted content may be a single stream of data. In alternate embodiments, the network encrypted content may contain multiple network encrypted streams, such as network encrypted elementary streams. Network encrypted elementary streams may be streams that contain audio data, video data, closed captioned data, or any other type of data. A network encrypted elementary stream may consist of compressed data from a single source, such as a particular network or channel. In embodiments where the network encrypted content may contain multiple network encrypted elementary streams, one or more network encrypted elementary streams may be individually received at operation 202. However, in alternate embodiments, the network encrypted content comprising multiple network encrypted elementary streams may be received at operation 202. In such embodiments, individual network streams may be filtered out, e.g., by performing PID filtering or other type of filtering, to isolate one or more individual network encrypted elementary streams at operation 202. Upon receiving the network encrypted content, flow continues to operation 204 where the network control word is obtained. In one embodiment, the network control word may be a control word provided by the content supplier, such as, but not limited to, a head-end or a server transmitting the content. In embodiments, the network control word may be previously known by the device performing the method 200. In another embodiment, the network control word may be received by the device. In such embodiments, the network control word may be encrypted, and operation 204 may include decrypting the network control word. For example, in embodiments, the network control word may be obtained by decrypting an ECM that contains the network control word. The ECM may be decrypted using information from another message, such as an EMM. While the ECM and EMM messages are part of the DVB architecture, one of skill in the art will appreciate that other content delivery systems and architectures may be employed with the systems and methods disclosed herein.

Flow continues to operation 206 where the network encrypted content (e.g., a network encrypted elementary stream or multiple network encrypted elementary streams) is decrypted using the network control word. In one embodiment, a single network control word may be used to decrypt the network encrypted content. In alternate embodiments, multiple control words may be used to decrypt the network encrypted content such as, for example, when the network encrypted content comprises multiple network encrypted elementary streams that have each been encrypted using a different network control word. In such embodiments, multiple network control words may be obtained at operation 204 and then used to decrypt multiple network elementary streams at operation 206. However, in still other embodiments, a single network control word may be used to encrypt multiple network elementary streams. In such embodiments, a single network control word may be used to decrypt the multiple network encrypted elementary streams. Decryption of the network encrypted content at operation 206 may result in clear content, that is, content that is not protected by encryption. Because operations 202-206 may be performed by a secure device or secure processor, such as, but not limited to, a smart card, the network control word remains on the secure device. By maintaining the network control word on the device, an unauthorized subscriber cannot intercept the network control word that is transmitted between the smart card and a device, such as a set-top-box, thereby impeding access to content by an unauthorized subscriber. In embodiments not shown in FIG. 2 the clear content may be provided by the secure processor for display or storage after decryption step 206. However, in the illustrated embodiment, an additional layer of protection may be added by performing local link encryption. In embodiments, local link encryption may comprise the re-encryption of the clear content using a local control word (LCW). The local control word may be an encryption key that is unique to a specific device. For example, in a set-top-box environment, the LCW may be an encryption key that is only shared with the particular set-top-box that the smart card performing the method 200 may be in communication with. In embodiments, different types of encryption modes may be performed for local link encryption. In one embodiment, not all of the data representing the content may be encrypted using local link encryption. For example, transport mode encryption may be used. In embodiments transport mode encryption comprises a determination as to which bytes of data to encrypt based upon an MPEG2 transport encryption. In another embodiment, Bulk Mode encryption may be performed. In Bulk Mode encryption, all bytes representing the data may be encrypted during local link encryption. Bulk Mode encryption may be utilized to exchange data between devices in a secure manner. For example, Bulk Mode encryption may be used to mix transport input (e.g., content) with internal data that is used by the one or more components participating in encryption/decryption of content. In further embodiments, Bulk Mode encryption may be utilized to support other types of content streams that may provide additional features, such as Internet Protocol television (IPTV) content streams. Selection of the encryption mode may be based upon data that is present in the content or a data stream that includes the content. For example, one or more bits may be a part of or added to the clear content to identify an encryption mode to perform during local link encryption. Furthermore, in embodiments, the encryption algorithm performed during local link encryption may be compliant with the ATIS-08000006 standard. However, one of skill in the art will appreciate that any type of encryption algorithm may be used for local link encryption, so long as the same encryption algorithm is available on both the smart card and the device.

In embodiments, a key setup used to select a key to be used for local link encryption may take place across security boundaries. For example, a key exchange may be made between a smart card and a set-top-box as part of the key setup. An exchanged key may be generated by a secure device, such as a smart card, and transmitted to a specific device that is communicating with the secure device, such as a set-top-box. Because the local link encryption key is specific to a single device, and not a network transmission, interception of the local link encryption key does not provide an unauthorized user the ability to globally access the broadcasted network content. In embodiments, multiple keys may be used for local link encryption. For example, a smart card may be able to simultaneously process multiple input streams and output multiple locally encrypted streams. In such embodiments, each locally encrypted stream may be encrypted using a unique local link encryption key. However, in other embodiments, the same local link encryption key may be used to encrypt each of the locally encrypted streams.

Flow continues to operation 208 where a local control word is obtained. A local control word may be any type of encryption key. In embodiments, the local control word may be an encryption key that is specific to a target device. In embodiments, the local control word may be obtained from ordinary software registers, a hardware key ladder, a random key generator, or from any other source. In one embodiment, the local control word may be dynamically generated and shared with a recipient device. In such embodiments, the key may be generated based upon characteristics of the device. In embodiment, multiple keys may be selected during obtain operation 208. For example, two keys may be selected from a key ladder. A key ladder may store or otherwise identify a plurality of interrelated keys. In embodiments, any type of encryption key or keys, e.g., fixed encryption keys, dynamic encryption keys, randomly generated encryption keys, etc. may be employed with the embodiments disclosed herein.

After obtaining the local control word, flow continues to operation 210 where the network decrypted content is re-encrypted using the local control word to generate locally encrypted content. As was previously discussed, different types of encryption modes and encryption algorithms may be used to encrypt the content at operation 210. In an embodiment, the encryption may be based upon the key obtained at operation 208. In embodiments where multiple keys are obtained, one of the keys may be selected and used during encryption at operation 210. For example, an appropriate key may be selected based upon an identifier in the content. The identifier may be part of the content or may be added to the content or a header associated with the content as it is processed during the method 200. The identifier may be a single bit that identifies an even or an odd key (in embodiments where two keys are obtained). This identifier provides for the automatic selection of a key for use during the encryption process at operation 210.

In further embodiments, in addition to encrypting the content, the size of the content may be increased. It may be beneficial to increase the size of the content in order to make it more difficult for the content to be shared over a network. For example, increasing the content size will require greater bandwidth to properly share the content with unauthorized users over a network. For example, data may be added to a broadcast stream to make it more difficult to process or share with unauthorized users. In embodiments where the content is streamed (e.g., audio and/or video content) non-content data packets may be added to the content stream and the bandwidth rates may be increased. The increase in bandwidth and the addition of non-content data provides additional security for the content when it leaves the secure device and/or secure processor that performs the method 200 by making the content more difficult to share and process. Further details regarding stream expansion are provided in U.S. Pat. No. 8,385,542 entitled, “Methods and Apparatus for Securing Communications Between a Decryption Device and a Television Receiver,” filed on Apr. 27, 2009, which is hereby incorporated by reference in its entirety.

While the embodiment of the method 200 is illustrated as decrypting the network encrypted content, and subsequently locally encrypting the decrypted network encrypted content as two distinct operations, one of skill in the art will appreciate that, in embodiments, the decryption and encryption may be performed sequentially, performed as a single operation, or performed in parallel. In embodiments, a person of skill in the art will appreciate that stream expansion may also be performed in the single decryption/encryption operation. As such, one of skill in the art will appreciate that the method described with respect to FIG. 2 may be performed using fewer or more operations than are illustrated herein.

In further embodiments, the method 200 may operate on stream data. In such embodiments, a network encrypted stream may be received at operation 202, a clear content stream may be generated by decrypting the network encrypted stream at operation 204, and a locally encrypted stream may be generated at operation 212. One of skill in the art will appreciate that the embodiments disclosed herein with respect to FIG. 2 (as well as with respect to FIGS. 3-4) may operate on stream data as well as data transmitted in any other form.

Further to the embodiment illustrated by FIG. 2, after performing the local encryption, flow continues to operation 212 where the locally encrypted content is provided to another device. For example, in a set-top-box environment, a smart card may provide the locally encrypted content to other components of the set-top-box for storage and/or display at operation 212. In a general computing device, the locally encrypted content may be provided from a secure processor to a general processor and/or unprotected memory for storage and/or display at operation 212. One of skill in the art will appreciate that the method 200 provides a solution to the problems described herein by providing locally encrypted content to unsecure components as opposed to providing a control word or encryption key as is generally performed by devices and systems that do not support embodiments of a Transport I/O system as described herein. Furthermore, one of skill in the art will appreciate that the weakest security leak in such content protection systems may occur when data is transmitted from a secure device and/or processor to a general device. However, embodiments disclosed herein address this weakness by providing locally encrypted content and, optionally, content that has its data and bandwidth expanded, thereby making it harder for an unauthorized user to process, share, and access the content even if it is intercepted as it is transmitted within the secure device and/or processor system/architecture.

In one embodiment, the locally encrypted content may be provided as individual locally encrypted elementary streams. For example, in embodiment where multiple network encrypted elementary streams are received and decrypted, the multiple elementary streams may be individually encrypted and returned as individual locally encrypted elementary streams. In an alternate embodiment, the multiple network encrypted elementary streams may be multiplexed into a single output stream. In such embodiments, the single output stream may be locally encrypted and then provided at operation 212. In embodiments, multiple elementary streams may be multiplexed into a single output stream prior to the local encryption performed at operation 210 or after the local encryption operation 210.

FIG. 3 is an embodiment of a method 300 for processing locally encrypted content. In embodiments, the method 300 may be performed by a device such as a set-top-box, a laptop computer, a tablet computer, a smart phone, a television, or any other type of general computing device. Flow begins at operation 302 where the locally encrypted content is received. In embodiments, the locally encrypted content may be received from a secure device and/or secure processor that performed the method 200 described with respect to FIG. 2. For example, in a non-limiting embodiment, the locally encrypted content may be received from a smart card that is in communication with a set-top-box. In another embodiment, the locally encrypted content may be received from a secure processor that is in communication with a general processor and/or general memory.

Upon receiving the locally encrypted content, flow continues to operation 304 where a local control word is obtained. A local control word may be any type of encryption key. In embodiments, the local control word may be an encryption key that is specific to the device performing the method 300. In embodiments, the local control word may be obtained from the smart card using ordinary software registers, a hardware key ladder, a random key generator, or from any other source unique to the device. In one embodiment, the local control word may be received from the secure device and/or processor performing the method 200. In another embodiment, the local control word may be generated by the device performing the method 300. In such embodiments, the local control word may have been previously shared with a secure processing device and/or secure processor that created the locally encrypted content received at operation 302. The local control word may be randomly generated. In embodiments, a single local control word may be used. In other embodiments, multiple local control words may be used. In such embodiments, the local control word may change periodically such that a local control word is discarded for a new local control word after a set period of time.

Flow continues to operation 306 where the locally encrypted content is decrypted using the local control word. Decryption of the locally encrypted content may produce content in the clear that is accessible by an application. One of skill in the art will appreciate that many type(s) of encryption mode(s) and/or algorithm(s) may be employed to decrypt the locally encrypted content. As such, a type of decryption algorithm may be employed at operation 306 to decrypt the content using the local control word. Furthermore, the device performing the decryption may be capable of handling and processing the locally encrypted content despite the increased bandwidth of the locally encrypted content due to non-content data. In such embodiments, decryption of the locally encrypted content at operation 306 may include identifying and removing non-content data from the content. In another embodiment, removal of the non-content data may not take place until the clear content is processed for display or storage.

Flow continues to operation 308 where the clear content is provided. In one embodiment, providing the clear content may include decoding, displaying and or otherwise playing the clear content. For example, the clear content may be displayed on a television, monitor, and or display that may be part of the device or in communication with the device performing the method 300. In another embodiment, providing the clear content may include storing the clear content in data storage that may be part of the device or connected to the device performing the method 300.

In an alternate embodiment, persistent encryption may be performed by not immediately decrypting the locally encrypted content as described in FIG. 3. In such embodiments, persistent encryption may be utilized on content, such as MPEG Transport Packets received from a broadcasted network transmission. In such embodiments, a secure device may still perform network decryption and local link encryption as described in FIG. 2; however, the device that receives the locally encrypted content may not immediately perform local link decryption. Instead, the device receiving the locally encrypted content may store the locally encrypted content, as it is encrypted, for later use. This allows the content to be encrypted for secure local storage, but the secure device can still control when the content is decrypted by, for example, providing a decryption key at a later time.

FIG. 4 is an embodiment of a method 400 for receiving and processing protected content using a Transport I/O system. In embodiments, the method 400 may be performed by a set-top-box, a smartphone, a laptop, a tablet, a television, or any other type of general computing device such as the recipient devices discussed with respect to FIG. 1. In embodiments, the device performing the method 400 may include or be in communication with and/or include a secure processing device and/or secure processor. The secure processing device and/or secure processor may be a removable component of the device. For example, the secure processor may be incorporated within a removable smart card that may be inserted and removed from a device performing the method 400.

Flow begins at operation 402 where network encrypted content is received. Network encrypted content may be received from a head-end device. In embodiments, the network encrypted content may be received over a wireless or wired network. For example, the network encrypted content may be received from a satellite television provider, a cable television provider, from a terrestrial transmission, from a cellular network provider, or from a server over the Internet. In embodiments, the network encrypted content is content that may be transmitted to multiple different devices. As such, the network encrypted content may be encrypted using a network control word that is common to all devices receiving the content. Upon receiving the network encrypted content, flow continues to operation 404 where the network encrypted content is decrypted using a secure processing device and/or secure processor. In such embodiments, the network encrypted content may be provided to the secure processing device and/or secure processor at operation 404. In one embodiment, the network encrypted content may be provided to the secure processor for decryption as it is received over a network. In another embodiment, the network encrypted content may be buffered prior to decryption by the secure processor.

As previously described, the secure processing device and/or secure processor may be part of the device performing the method 400 or may be a removable component of the device performing the method 400 (e.g., a smart card). In embodiments where the secure processor and/or secure processing device is a removable component, the secure processor and/or secure processing device may have a form factor such that it is compatible with legacy systems. For example, a smart card may have the form factor to operate in an ISO-7816 mode (or any other type of mode) in addition to a mode that supports the systems and methods for performing Transport I/O disclosed herein.

In one embodiment, the network encrypted content may be provided to the secure processor in an unfiltered manner. For example, one or more unfiltered MPEG Transport Streams may be provided. In such embodiments, the MPEG Transport Streams may be provided as received, without the prior removal of packets identified by packet identifiers (PIDs). In another embodiment, the device may filter the network encrypted content before decrypting the network encrypted content using a secure processor. For example, one or more filtered MPEG Transport Streams may be provided to the secure processor for decryption by removing some packets identified by PIDs. In yet another embodiment, multiple streams may be multiplexed and provided to the secure processor for decryption. For example, two or more MPEG Transport Streams may be multiplexed to create a combined stream. The combined stream may be provided to the secure processor for decryption.

In embodiments, the decryption operation 404 may also perform the method 200 discussed with respect to FIG. 2. In such embodiments, the result of the operation 404 may also yield locally encrypted content. Flow continues to operation 406 where the locally encrypted content is decrypted. In embodiments, the method 300 described with respect to FIG. 3 may be employed at operation 406 to decrypt the locally encrypted content. In embodiments, decryption of the locally encrypted content is performed by a component on the device performing the method 400 that is not part of the secure processor. For example, the decryption may be performed by a general processor. In embodiments, decrypting locally encrypted content may yield a stream of unencrypted content.

Flow continues to operation 408 where the clear content is processed. In one embodiment, clear content may be processed by providing the content to a display and/or audio device that is part of or connected to the device performing the method 400. In another embodiment, the clear content may be stored in memory or non-volatile storage at operation 408. One of skill in the art will appreciate that any type of processing of the clear content may be performed at operation 408.

As described with respect to embodiments of the method 400 a device performing the method may include different components to perform the different operations of the method 400. For example, decryption of the network encrypted content may be performed by a secure component that is part of the device. In embodiments, the secure component may be removable, such as a smart card. The local decryption and processing operations may be performed by components other than the secure component. However, because the decryption of the network encrypted content is performed by the secure component, the network control word is not vulnerable to interception and sharing. Thus, the method 400 is a more secure process of decrypting network encrypted content without exposing the one or more keys required to decrypt the network encrypted content.

In embodiments where the secure processor is removable, such as, but not limited to, a smart card, different data rates may be employed when the device performing the method 400 communicates with the removable secure processor. In one embodiment, a fixed data rate may be used for all communications between the device and the removable secure processor. In another embodiment, the data rate may be variable dependent upon the type of content and/or the type of messages exchanged between the device and the removable secure processor. In further embodiments, different types of signaling may be employed to communicate between the device and the removable secure processor. For example, in embodiments where the removable secure processor is a smart card, low-voltage differential signaling (LVDS) may be employed.

In further embodiments, the method 400 may be performed simultaneously on different network content to process multiple network encrypted streams or multiple pieces of network encrypted content. For example, in a set-top-box environment, the device may be able to process multiple data streams at a time. For example, a set-top-box may allow a user to watch one channel while recording one or more other channels. In such embodiments, the set-top-box may simultaneously employ the method 400 on multiple streams to decrypt the network encrypted content. In such embodiments, the removable secure processor, e.g., smart card, is capable of simultaneously decrypting multiple network encrypted content streams and creating multiple different locally encrypted streams. In such embodiments, different network control words may be used to decrypt the different network encrypted content and different local control words may be used to create different locally encrypted content.

FIG. 5 is an embodiment of a method 500 that may be employed to reset functionality of a secure device, such as, for example, a smart card, while maintaining transport stream functionality. Flow begins at operation 502 where the secure device receives an instruction to reset. In embodiments, the instruction may indicate that core functionality are to be reset independently from transport functionality. For example, core functionality may relate to the operating instructions, e.g., the core software, for the operating of the secure device. For example, the core software may be reset to, e.g., perform a software upgrade, to recover from a malfunction, or due to a lack of synchronization, etc. However, because the secure device processes network encrypted streams, unlike prior solutions where network encrypted streams were processed by components that were not part of the secure device, the secure device must be reset without interrupting streamed data. In the embodiments described herein, if the secure device is completely reset, the processing of the streamed data may be interrupted during the reset. In embodiments, the signal received at operation 502 may indicate a partial reset (e.g., resetting only core functionality and/or software) or the secure device may make a determination to perform a partial reset.

Flow continues to operation 504 where the secure device resets the core functionality while maintaining the transport functionality. In embodiments, the components of the secure device that perform the core functionality may be reset while the components that perform the transport functionality continue to operate. As such, maintenance may be performed on the core functionality of the secure device without interrupting the processing of data streams received by the secure device. For example, while the core functionality of the secure device are reset, the secure device may still able to receive transport data, process the transport data (e.g., by performing the method 200 from FIG. 2), and provide the processed packets (e.g., locally encrypted content) to another device. By performing the partial reset, network encrypted content may still be decrypted and locally encrypted during a reset of the device, thereby providing the ability of the secure device to continually provide content while performing maintenance. Flow then continues to operation 506 where the core functionality of the secure device are restarted and the maintenance is completed.

In embodiments, because the secure device is processing network data, e.g., the network encrypted content, variable bandwidth data is provided to the secure device. This differs from prior systems in which a secure device, e.g., a smart card, received a fixed bandwidth amount of data. In order to deal with variable bandwidth data, embodiments of the secure devices disclosed herein may perform a packet pacing algorithm. FIG. 6 is an embodiment of a packet pacing method 600 that may be employed by a secure device operating in a variable bandwidth environment. In embodiments, the method 600 is a closed loop feedback mechanism whereby a secure device may provide a clear to send (CTS) message or signal to notify that the device communicating with the secure device, e.g., a set-top-box or system on a chip, is allowed to send additional packets of data to the secure device. In embodiments, the method 600 may be employed to ensure that the secure device is capable of extracting a variable amount of data from multiple fixed input streams while throttling the amount of effective data by employing one or more CTS messages. In embodiments, sending a CTS message or signal by the secure device to a device it is communicating with triggers the device to send packets of interest (e.g., packets containing useful data such as transmission data, control data, etc.). In an embodiment, when the secure device does not send a CTS message, the secure device may receive stuffing packets from the device it is communicating with.

In embodiments, the secure device may employ a first-in-first-out (FIFO) buffer to perform packet pacing. The secure device may monitor the FIFO buffer to control the packet pacing of the variable bandwidth data received by the secure device. For example, the secure device may monitor the capacity and/or fullness of the FIFO buffer. If the number of packets queued in the FIFO fall below a threshold, the secure device may send a CTS message to a device communicating with the secure device to trigger receipt of additional data. In embodiments, a low level of data may be maintained in the FIFO buffer to ensure minimal latency for queued live packets that have a high priority. During periods of high activity, the secure device may ensure that live packets get higher priority by maintaining a small FIFO buffer.

Flow begins at operation 602 where the FIFO buffer is monitored. Monitoring the FIFO buffer may comprise checking the number of items in the FIFO buffer. In embodiments, any method of monitoring a buffer or the contents of a buffer may be performed at operation 602. Flow continues to decision operation 604, where a determination is made as to whether the number of contents in the FIFO buffer is lower than a predetermined threshold. In one embodiment, the threshold may be based upon processing time for a packet in the buffer. In another embodiment, the threshold may be based upon a calculation. If the number of items in the FIFO buffer is lower than the threshold, FIG. 6 shows that flow branches “YES” to operation 606 where a CTS message or signal is sent to trigger the receipt of additional data packets and flow returns to operation 602. For example, the CTS message may be sent to a video processing device, a set-top-box, or other type of device instructing the device to send additional data to the secure processor. If the number of items is not lower than the threshold, FIG. 6 shows that flow branches “NO” and returns to operation 602. Although embodiments have been described with a FIFO buffer, other types of queues may be employed without departing from the scope of the present disclosure.

In embodiments where the secure processor is a removable component, the secure processor may be designed such that it is capable of working in legacy systems. In embodiments, the secure processor is a removable component that has a legacy form factor. For example, a smart card may be designed to support both ISO-7816 signals and signals for the Transport I/O system described herein. FIG. 7 is an embodiment illustrating the compatibility between an ISO-7816 smart card and a smart card capable of supporting the systems and methods disclosed herein. Smart card 702 is an embodiment of an ISO-7816 compatible smart card. Smart card 704 is a smart card compatible with both ISO-7816 and the Transport I/O systems and methods disclosed herein. In the illustrated embodiment, smart card 704 includes all of the contacts necessary to be compatible with the ISO-7816 standard (e.g., supports a legacy form factor). Additionally, smart card 704 includes six contacts, identified by the ellipse 706 that may be used to perform the systems and methods described herein. In such embodiments, the smart card 704 may be capable of working with both existing systems (e.g., legacy devices deployed to the field) and Transport I/O capable systems.

In embodiments, the device performing the method 400 and/or the removable secure device may make a determination as to whether to operate in a legacy mode (e.g., an ISO-7816 mode) or in a Transport I/O system compatible mode at start up. In one embodiment, the determination may be made based upon a signal sent to the removable secure device at initialization. Further details regarding the making of such determination is provided in U.S. patent application Ser. No. 13/184,831 entitled, “Multiple-Speed Interface,” filed on Jul. 18, 2011, which claims priority to U.S. Provisional Patent Application No. 61/364,854, filed on Jul. 16, 2011, which is hereby incorporated by reference in its entirety.

FIG. 8 is an embodiment of a secure processing device 800 that may be employed with the systems or to perform the methods disclosed herein. In embodiments, the secure processing device may be a smart card. However, one of skill in the art will appreciate that any other type of secure device may be employed with the systems and methods disclosed herein. In embodiments, the secure processing device may be part of a device performing the method 400 described with respect to FIG. 4. In another embodiment, the secure processing device 600 may be a removable component of a device performing the method 400.

In embodiments, secure processing device 800 includes one or more processing units 802. In some embodiments, one or more components of the methods described herein are performed by the one or more processing units 802. For example, the one or more processing units 802 may be used to decrypt network encrypted content, create locally encrypted content, and create non-content data as described in the method 200 of FIG. 2.

Secure processing device 800 may also include memory 804. Memory 604 includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, or any other tangible medium which is used to store information and which is accessed by secure processing device 800 and one or more processing units 802. Memory 804 may store executable instructions to perform the methods disclosed herein. For example, memory 804 may include instructions to decrypt network encrypted content (NEC) 806. Memory may also store the instructions to encrypt clear content to create locally encrypted content (LEC) 808.

Secure processing device 800 may also contain communications connection(s) 810 that allow the device to communicate with other devices. Communication connection(s) 810 is an example of communication media. Communication media may embody a modulated data signal, such as a carrier wave or other transport mechanism and includes any information delivery media, which may embody computer readable instructions, data structures, program modules, or other data in a modulated data signal. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information or a message in the data signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as an acoustic, RF, infrared, and other wireless media. In embodiments, network encrypted content such may be received over communications connection(s) 810. Locally encrypted content may be transmitted over communications connection(s) 810. In still further embodiments, the instructions to perform the Transport I/O methods described herein may be received via communications connection(s) 810. For example, a head-end may update secure processing device 800 with instructions to perform the methods disclosed herein. The instructions may be stored in memory 804. Communications connection(s) 810 thereby allows a head-end to update smart cards deployed in the field with instructions to perform the methods herein. Communications connections also provide the secure processing device 800 with the ability to receive network encrypted content from a device and return locally encrypted content to the device. In embodiments, communication connections may be pads on a smart card, such as, but not limited to, the pads identified as Transport I/O capable pads 706 in FIG. 7.

Although the embodiment of the secure processing device 800 is illustrated as having memory 804 that includes instructions to perform the methods disclosed herein, in alternate embodiments, the instructions to perform the methods disclosed herein may be performed by an application specific integrated circuit (ASIC) that is part of the secure processing device 800.

FIG. 9 is an embodiment of a set-top-box that may be used to perform the Transport I/O system methods and be part of the systems disclosed herein. In another embodiment, different recipient devices such as, but not limited to, a smart phone, a tablet computer, a laptop, or any other type of device may be employed containing some of the components illustrated in FIG. 9. While FIG. 9 is illustrated with various components, many of the components are known to the art and do not need explanation. Only the components that may be used to perform the methods disclosed herein are described. The signal 904 that arrives at the set-top-box 900 may undergo extensive processing. The television converter 900 may include one or more tuner devices 906, 946, 948 that may receive a signal 904. Signal 904 may be a satellite signal, a cable signal, or any other type of signal received over a wired or wireless network. In this embodiment, tuner devices 906, 946, 948 acquire a signal 904 from a head-end or content provider. Tuner devices 906, 946, 948 may initially process the signal 904. Signal 904 may be a data stream that comprises network encrypted content (e.g., one or more multiple network encrypted streams), multiple clear content (e.g., one or more multiple clear content streams) and/or metadata containing information about the data stream or the multiple encrypted and/or clear streams that make up the data stream. Tuner device 906, 946, 948 may also receive subscriber commands in the form of signals from control electronics unit 902. Signals from control electronics unit 902 may include, but is not limited to, a signal to tune to a transponder as part of the process of selecting a certain channel for viewing on a peripheral device. One skilled in the art would recognize that the tuner devices 906, 946, 948 may include fewer, more, or different components. The signal 904 may include content encoded by a network control word. The signal 904 may also include one or more ECMs and EMMs.

After receiving the signal 904, one of the first steps may be to demodulate 908 the signal 904. The signal 904 may arrive as an analog signal that “carries” data (e.g., data is modulated onto the analog signal). Demodulation 908 may be accomplished by reversing the modulation process. Modulation can be done in several ways. Modulation may include amplitude modulation (AM) or frequency modulation (FM). If the carried data is digital, modulation methods include, but are not limited to, biphase-shift keying (BPSK), quadraphase-shift keying (QPSK), or eight-phase shift keying (8PSK). One skilled in the art will recognize that other methods of modulating and demodulating the signal 904 may be possible. Another one of the first steps may also be to error correct 908 signal 904. One example of error correcting 908 is forward error correction (FEC). FEC 908 may include, but is not limited to, inspecting parity bit or bits that may accompany signal 904. One skilled in the art will recognize that many methods for error correcting are possible. For the purposes of discussion, an embodiment using digital data will be discussed below. However, one skilled in the art will recognize that systems with analog data or combined analog and digital data are also possible and contemplated herein.

In embodiments, set-top-box 900 contains control electronics unit 902 that receives signal 904. In embodiments, the control electronics unit 902 may comprise a smart card interface. One skilled in the art will recognize that control electronics 902 may receive other signals, including, but not limited to, signals from a cable, satellite, or broadcast television distributor. In this embodiment, control electronics unit 902 includes discrete electronic components combined into a single circuit with a shared bus 910. In other embodiments, control electronics unit 902 may be configured differently. For example, one or more of the control electronics unit 902 components in set-top-box 900 may be combined or omitted. As a further example, one or more of the control electronics unit 902 components in set-top-box 900 may not share a bus 910, but may nonetheless be operatively connected by some other means. One skilled in the art will recognize that other configurations of set-top-box 900 and control electronics unit 902 are possible and within the scope of this invention. One skilled in the art will further recognize that some components of set-top-box 900 and control electronics unit 902 may be implemented in hardware or software. The control electronics unit 902 may operate under the control of a software program, firmware program, or some other program stored in memory or control logic. One skilled in the art will also recognize that the control electronics unit 902 may include other electronic components or structures to mediate or process signals.

Control electronics unit 902 may contain one or more central-processing-units (CPUs) 912 or processors. In this embodiment, control electronics unit 902 contains a single CPU 912 that is operatively connected to the shared bus. In this embodiment, CPU 912 may be used, among other things, for logical operations for set-top-box 900 functions including, but not limited to, channel selection, recording control. EPG display and control and system maintenance. One skilled in the art will recognize that the CPU 912 may be integrated with memory or other discrete electronics components. In embodiments, CPU 912 may be used to perform the systems and methods disclosed herein. For example, CPU 912 may be used to perform a method of decrypting locally encrypted content as described with respect to FIG. 3. However, in embodiments, local decryption may be performed by other components, such as a dedicated crypto engine (not shown). One of skill in the art will appreciate that although specific components are described with respect to FIG. 9, the system and methods disclosed herein may be performed by other components or other types of devices without departing from the spirit of this disclosure.

Control electronics unit 902 may contain one or more volatile memory components 914. Volatile memory components 914 may include, but are not limited to, one or more SDRAM memory chips. Similarly, control electronics unit 902 may also contain one or more non-volatile memory components 916. Non-volatile memory 916 may include one or more memory chips, including, but not limited to, ROM, EEPROM, and Flash. One skilled in the art will recognize that volatile memory 914 and non-volatile memory 916 may be integrated within other electronics components. One skilled in the art will also recognize that other memory components may be included within set-top-box 900 and control electronics unit 902. One skilled in the art will recognize that memory 914, 916 may be used for many purposes, including, but not limited to, storing EPG data and storing data for use by CPU 912. In embodiments, the Volatile memory components 914 and/or one or more non-volatile memory components 916 may be used to store the instructions to perform methods 300 and 400 disclosed herein. Non-volatile memory 916 may be used to store locally encrypted content or clear content. In other embodiments, hard drive 950 may be used to store locally encrypted content or clear content.

A set-top-box 900 may be connected to one or more peripheral electronic devices through peripheral interface 924. These peripheral devices may include a smart card 936. In embodiments, the smart card 936 acts as a conditional access system. In such embodiments, the smart card 936 performs the methods 200 and 400 disclosed herein. In embodiments, smart card 936 may be a smart card such as smart card 504 that is capable of supporting both a legacy mode of operation and a Transport I/O mode of operation. In still further embodiments, smart card 936 may have the components described with respect to FIG. 8. Peripheral interface 924 may also act as an I/O connection to provide the clear content to a display device, such as, but not limited to, a television and speakers.

With reference to FIG. 10, an embodiment of a computing environment for implementing the various embodiments described herein includes a computer system, such as computer system 1000. Any and all components of the described embodiments (such as the DVR, the content storage sever, a laptop, mobile device, personal computer, a smart phone, a secure processing device, etc.), may execute as or on a client computer system, a server computer system, a combination of client and server computer systems, a handheld device, and other possible computing environments or systems described herein. As such, a basic computer system applicable to all these environments is described hereinafter.

In its most basic configuration, computer system 1000 comprises at least one processing unit or processor 1004 and system memory 1006. The most basic configuration of the computer system 1000 is illustrated in FIG. 10 by dashed line 1002. In some embodiments, one or more components of the described system are loaded into system memory 1006 and executed by the processing unit 1004 from system memory 1006. Depending on the exact configuration and type of computer system 1000, system memory 1006 may be volatile (such as RAM), non-volatile (such as ROM, flash memory, etc.), or some combination of the two.

Additionally, computer system 1000 may also have additional features/functionality. For example, computer system 1000 may include additional storage media 1008, such as removable and/or non-removable storage, including, but not limited to, magnetic or optical disks or tape or solid state storage. In some embodiments, software or executable code and any data used for the described system is permanently stored in storage media 1008. Storage media 1008 includes volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules, or other data.

System memory 1006 and storage media 1008 are examples of computer storage media. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage, other magnetic storage devices, solid state storage or any other tangible medium which is used to store the desired information and which is accessed by computer system 1000 and processor 1004. Any such computer storage media may be part of computer system 1000. In some embodiments, system memory 1006 and/or storage media 1008 may store data used to perform the methods or form the system(s) disclosed herein. In other embodiments, system memory 1006 may store information such as the local control word 1014 and logic 1016 to perform the methods of decrypting locally encrypted content as described herein.

Computer system 1000 may also contain communications connection(s) 1010 that allow the device to communicate with other devices. Communication connection(s) 1010 is an example of communication media. Communication media may embody a modulated data signal, such as a carrier wave or other transport mechanism and includes any information delivery media, which may embody computer readable instructions, data structures, program modules, or other data in a modulated data signal. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information or a message in the data signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as an acoustic, RF, infrared, and other wireless media. In an embodiment, content and metadata may be transmitted over communications connection(s) 1010.

In some embodiments, computer system 1000 also includes input and output connections 1012, and interfaces and peripheral devices, such as a graphical user interface. Input device(s) are also referred to as user interface selection devices and include, but are not limited to, a keyboard, a mouse, a pen, a voice input device, a touch input device, etc. Output device(s) are also referred to as displays and include, but are not limited to, cathode ray tube displays, plasma screen displays, liquid crystal screen displays, speakers, printers, etc. These devices, either individually or in combination, connected to input and output connections 1012 are used to display the information as described herein. All these devices are well known in the art and need not be discussed at length here. In further embodiments, the input and output connections 1012 may be used to communicate with a removable secure processor, such as, but not limited to, a smart card.

In further embodiments, computer system 1000 may include a secure processor 1018 and secure memory 1020 that may be used to perform some of the methods disclosed herein. In embodiments, the secure processor 1018 and secure memory 1020 of the computer system 1000 may comprise a secure area 1022 that is not generally accessible by the other components of computer system 1000 or by other processes executing on the computer system 1000. In embodiments, secure memory may store instructions to decrypt network encrypted content and create locally encrypted content as described with respect to FIG. 2. Such instructions may be executed by the secure processor 1018. In such embodiments, network control words may remain within the secure area 1022, thereby reducing the chance of interception and sharing by unauthorized parties.

In some embodiments, the components described herein comprise such modules or instructions executable by computer system 1000 that may be stored on computer storage medium and other tangible mediums and transmitted in communication media. Computer storage media includes volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules, or other data. Combinations of any of the above should also be included within the scope of readable media. In some embodiments, computer system 1000 is part of a network that stores data in remote storage media for use by the computer system 1000.

The embodiments described herein may be employed using software, hardware, or a combination of software and hardware to implement and perform the systems and methods disclosed herein. Although specific devices have been recited throughout the disclosure as performing specific functions, one of skill in the art will appreciate that these devices are provided for illustrative purposes, and other devices may be employed to perform the functionality disclosed herein without departing from the scope of the disclosure.

This disclosure described some embodiments of the present invention with reference to the accompanying drawings, in which only some of the possible embodiments were shown. Other aspects may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments were provided so that this disclosure was thorough and complete and fully conveyed the scope of the possible embodiments to those skilled in the art.

Although specific embodiments were described herein, the scope of the invention is not limited to those specific embodiments. One skilled in the art will recognize other embodiments or improvements that are within the scope and spirit of the present invention. Therefore, the specific structure, acts, or media are disclosed only as illustrative embodiments. The scope of the invention is defined by the following claims and any equivalents therein.

Beals, William Michael, Fischer, Nicolas, Ellis, Benjamin Brian, Duval, Gregory

Patent Priority Assignee Title
D949864, Mar 13 2013 NAGRASTAR LLC Smart card interface
Patent Priority Assignee Title
2474365,
2640647,
3311084,
3502437,
3702025,
3832134,
3853468,
3898172,
3990850, Jan 06 1976 Akzona Incorporated Diagnostic test card
4029945, Aug 27 1975 Stanley Electric Co., Ltd. Card and card reader apparatus therefor
4099886, Aug 04 1975 Minnesota Mining and Manufacturing Company Detecting system
4104785, Feb 28 1975 Nippon Electric Co., Ltd. Large-scale semiconductor integrated circuit device
4205043, May 04 1978 Hazardous atmosphere badge
4249302, Dec 28 1978 NCR Corporation Multilayer printed circuit board
4305721, Aug 20 1979 Becton Dickinson & Company Agglutination assay
4387972, Feb 26 1981 Immuno Concepts, Inc. Microscope slide with confirming wells
4394654, Apr 17 1980 HANNSHEINZ PORST Identification device
4417413, May 17 1979 GAO Gesellschaft fur Automation und Organisation mbH Identification card with IC chip and a method for manufacturing the same
4532419, Sep 09 1982 Sony Corporation Memory card having static electricity protection
4549200, Jul 08 1982 International Business Machines Corporation Repairable multi-level overlay system for semiconductor device
4549247, Nov 21 1980 GAO GESELLSCHAFT FUR AUTOMATION UND ORGANISATION MBH, GERMANY A CORP OF W GERMANY Carrier element for IC-modules
4575621, Mar 07 1984 CORPRA, A CORP OF PA Portable electronic transaction device and system therefor
4600257, Mar 08 1983 Canon Kabushiki Kaisha Electronic memory device
4603249, Dec 24 1981 , Identification card having an IC module
4614861, Nov 15 1984 Intellicard International, Inc.; INTELLICARD INTERNATIONAL,INC Unitary, self-contained card verification and validation system and method
4639585, May 29 1984 GAO Gesellschaft fur Automation und Organisation mbH Data carrier with an IC module and a method for producing such a data carrier
4677529, Mar 12 1985 ALPS Electric Co., Ltd. Circuit board
4689103, Nov 18 1985 E I DUPONT DE NEMOURS & COMPANY, INCORPORATED, A CORP OF DELAWARE; ELITE CIRCUITS, INC , A CORP OF CALIFORNIA Method of manufacturing injection molded printed circuit boards in a common planar array
4696034, Oct 12 1984 Signal Security Technologies High security pay television system
4727246, Aug 31 1984 Casio Computer Co., Ltd. IC card
4774633, Jun 26 1985 CP8 Technologies Method for assembling an integrated circuit with raised contacts on a substrate, device thereby produced and an electronic microcircuit card incorporating said device
4783823, Sep 16 1985 OMRON TATEISI ELECTRONICS CO Card identifying method and apparatus
4789214, Sep 21 1987 Tacan Corporation Micro-optical building block system and method of making same
4792843, Oct 24 1984 GAO Gesellschaft fur Automation und Organisation mbH Data carrier having an integrated circuit and method for producing same
4795895, Jul 10 1985 Casio Computer Co., Ltd. Multi-layered electronic card carrying integrated circuit pellet and having two-pad layered structure for electrical connection thereto
4797542, Feb 04 1986 Casio Computer Co., Ltd. Multiple application electronic card-like apparatus
4803154, Apr 25 1985 Shionogi & Co., Ltd. Multi-spot enzyme immunoassay method
4803542, Aug 05 1981 Gao Gessellschaft fur Automation und Organisation mbH Carrier element for an IC-module
4814943, Jun 04 1986 Oki Electric Industry Co., Ltd. Printed circuit devices using thermoplastic resin cover plate
4817183, Aug 16 1985 Fingerprint recognition and retrieval system
4822989, May 21 1986 Hitachi, LTD Semiconductor device and method of manufacturing thereof
4825283, Jul 03 1986 SHARP KABUSHIKI KAISHA, OSAKA, JAPAN, A CORP OF JAPAN IC card
4835846, Sep 14 1987 EM Microelectronic Marin SA Method of manufacture of electronic modules for cards with microcircuits
4844866, Nov 13 1984 MATRIX TECHNOLOGIES, INC , A TEXAS CORP Carrier for detecting drug abuse compounds
4849944, Aug 18 1986 Tokyo Electric Company, Ltd. Connecting structure for connecting a memory unit to a memory unit controller
4868376, May 15 1987 SAFENET, INC Intelligent portable interactive personal data system
4887234, Nov 30 1985 Kabushiki Kaisha Toshiba Portable electronic device with plural memory areas
4889980, Jul 10 1985 Casio Computer Co., Ltd. Electronic memory card and method of manufacturing same
4897534, Nov 20 1986 GAO Gesellschaft fur Automation und Organisation mbH Data carrier having an integrated circuit and a method for producing the same
4980802, May 09 1988 CP8 Technologies Flexible printed circuit
4984358, Oct 27 1989 SAMSUNG ELECTRONICS CO , LTD Method of assembling stacks of integrated circuit dies
4985920, Feb 20 1988 Fujitsu Limited Integrated circuit card
5027190, Jul 16 1987 GAO Gesellschaft fur Automation und Organisation mbH Carrier element to be incorporated into an identity card
5031026, Mar 17 1986 Mitsubishi Denki Kabushiki Kaisha Thin semiconductor card
5049718, Sep 08 1989 Microelectronics and Computer Technology Corporation; Digital Equipment Corporation Method of laser bonding for gold, gold coated and gold alloy coated electrical members
5055913, Nov 20 1986 GAO Gesellschaft fur Automation und Organisation mbH Terminal arrangement for integrated circuit device
5097117, Jul 02 1987 CP8 Technologies Electronic microcircuit card and method for its manufacture
5122860, Aug 26 1987 Matsushita Electric Industrial Co., Ltd. Integrated circuit device and manufacturing method thereof
5126548, Jul 19 1989 Kabushiki Kaisha Toshiba IC card with additional terminals and method of controlling the IC card
5134773, May 26 1989 SEMPAC SA Method for making a credit card containing a microprocessor chip
5155068, Aug 31 1989 Sharp Kabushiki Kaisha Method for manufacturing an IC module for an IC card whereby an IC device and surrounding encapsulant are thinned by material removal
5203078, Jul 17 1985 IBIDEN CO , LTD Printed wiring board for IC cards
5208450, Apr 20 1988 Matsushita Electric Industrial Co., Ltd. IC card and a method for the manufacture of the same
5220598, Apr 05 1989 Telephone
5250341, Mar 26 1990 Mitsubishi Denki Kabushiki Kaisha IC card
5276311, Mar 01 1989 E-PASS TECHNOLOGIES, INC Method and device for simplifying the use of a plurality of credit cards, or the like
5276317, Aug 03 1990 Societe Anonyme Dite: Alcatel Radiotelephone Device for housing a smart card
5304513, Jul 16 1987 GAO Gesellschaft fur Automation und Organisation mbH Method for manufacturing an encapsulated semiconductor package using an adhesive barrier frame
5361062, Nov 25 1992 EMC Corporation Personal security system
5362955, Mar 07 1990 GAO Gesellschaft fur Automation und Organisation mbH IC card having severable mini chip card
5363279, Nov 14 1991 LG SEMICON CO , LTD Semiconductor package for a semiconductor chip having centrally located bottom bond pads
5375037, Jan 14 1992 Gemplus Memory card having a recessed portion with contacts connected to an access card
5386340, Aug 13 1993 A K STAMPING CO , INC Enclosure for personal computer card GPT
5444301, Jun 23 1993 Goldstar Electron Co. Ltd. Semiconductor package and method for manufacturing the same
5448511, Jun 01 1994 Storage Technology Corporation Memory stack with an integrated interconnect and mounting structure
5463210, Oct 28 1992 Sony Corporation IC card reader
5486687, Jan 14 1992 Gemplus Memory card having a recessed portion with contacts connected to an access card
5512490, Aug 11 1994 Trustees of Tufts College Optical sensor, optical sensing apparatus, and methods for detecting an analyte of interest using spectral recognition patterns
5521366, Jul 26 1994 Symbol Technologies, Inc Dataform readers having controlled and overlapped exposure integration periods
5526233, Dec 19 1991 Casio Computer Co., Ltd. Adapter for integrated circuit device, and data transmission system using the same
5543585, Feb 02 1994 GLOBALFOUNDRIES Inc Direct chip attachment (DCA) with electrically conductive adhesives
5544014, Aug 12 1992 RAKUTEN, INC IC card having a built-in semiconductor integrated circuit device
5563400, Oct 12 1994 Gemplus Card International Multi-applications portable card for personal computer
5581065, Aug 02 1993 DAI NIPPON PRINTING CO , LTD Sheet-framed IC carrier, method for producing the same, and IC carrier case
5615085, Jul 01 1992 Seiko Epson Corporation Temperature control for add-on electronic devices
5623552, Jan 21 1994 UNIQARD, LLC Self-authenticating identification card with fingerprint identification
5637858, Dec 23 1993 Giesecke & Devrient GmbH Method for producing identity cards
5655917, Dec 28 1994 Molex Incorporated Connector for miniature circuit card
5677524, Oct 01 1991 GAO Gesellschaft fur Automation und Organisation mbH Chip card and a method for producing it
5721781, Sep 13 1995 Microsoft Technology Licensing, LLC Authentication system and method for smart card transactions
5724545, Apr 12 1990 Memory card with capacity-independent 3-line addressing system
5727153, Jun 06 1995 STERLING GLOBAL SOLUTIONS, LLC D B A SPARKFLY Retail store having a system of receiving electronic coupon information from a portable card and sending the received coupon information to other portable cards
5729000, Aug 31 1994 Oki Electric Industry Co., Ltd. IC card reader
5739515, Jan 24 1995 Kabushiki Kaisha Toshiba IC card reader/writer
5742680, Nov 13 1995 AMARYLLIS INTERNATIONAL, LTD Set top box for receiving and decryption and descrambling a plurality of satellite television signals
5745988, Jun 21 1994 GIESECKE+DEVRIENT MOBILE SECURITY GMBH Method for producing data carriers
5747274, Oct 12 1990 NEXUS DX, INC Method and device for diagnosing and distinguishing chest pain in early onset thereof
5752857, May 24 1996 ITT Manufacturing Enterprises, Inc Smart card computer adaptor
5773812, Feb 08 1994 Angewandte Digital Elektronik GmbH Chip card capable of both contact and contactless operation including a contact block
5776797, Dec 22 1995 Fairchild Space and Defense Corporation Three-dimensional flexible assembly of integrated circuits
5780098, Jun 07 1995 Minnesota Mining and Manufacturing Company Sterilization indicators and methods
5780836, Oct 16 1995 Oki Electric Industry Co., Ltd. IC card for portable type electronic apparatus and card insertion method
5780837, Jun 14 1995 Giesecke & Devrient GmbH Standard card having an embedded mini chip card
5789733, Sep 20 1996 SHENZHEN XINGUODU TECHNOLOGY CO , LTD Smart card with contactless optical interface
5822190, Jun 11 1996 Kabushiki Kaisha Toshiba Card type memory device and a method for manufacturing the same
5852290, Aug 04 1995 Thomson Consumer Electronics, Inc. Smart-card based access control system with improved security
5865470, May 12 1992 THOMPSON, JAMES Peel off coupon redemption card with microprocessor chip and tracking system
5869791, Apr 18 1995 U.S. Philips Corporation Method and apparatus for a touch sensing device having a thin film insulation layer about the periphery of each sensing element
5877488, Apr 22 1996 Stocko Metallwarenfabriken Henkels Und Sohn GmbH Combination chip card reader
5877975, Aug 13 1996 Winbond Electronics Corporation Insertable/removable digital memory apparatus and methods of operation thereof
5932866, May 19 1995 Dai Nippon Printing Co., Ltd. Optical card with a built-in IC module technical field
5933328, Jul 28 1998 SanDisk Technologies LLC Compact mechanism for removable insertion of multiple integrated circuit cards into portable and other electronic devices
5948673, Sep 12 1995 Becton Dickinson and Company Device and method for DNA amplification and assay
5955961, Dec 09 1991 Programmable transaction card
5991400, Oct 31 1995 U S PHILIPS CORPORATION Time-shifted conditional access
5993261, Mar 19 1997 Stocko Metallwarenfabriken Henkels und Sohn GmbH & Co. Adaptor for contacting card-shaped supports
5998220, May 29 1991 Beckman Coulter, Inc Opposable-element assay devices, kits, and methods employing them
6024920, Apr 21 1998 BIO-RAD LABORATORIES, INC Microplate scanning read head
6025997, May 04 1998 Siemens Aktiengesellschaft Chip module for semiconductor chips having arbitrary footprints
6027028, Jul 26 1996 KONINKLIJKE KPN N V Connector formed as a sleeve pushed over a standard chip card
6035037, Aug 04 1995 Thomson Electronic Consumers, Inc. System for processing a video signal via series-connected high speed signal processing smart cards
6036099, Oct 07 1996 LEIGHTON, KEITH; LEIGHTON, LOIS; JANUZZI, ROLAND A ; JANUZZI, CONSTANCE J; NIEDZWIECKI, CARL J; NIEDZWIECKI, CATHERINE M ; KING, BRIAN P Hot lamination process for the manufacture of a combination contact/contactless smart card and product resulting therefrom
6048734, Sep 15 1995 The Regents of the University of Michigan Thermal microvalves in a fluid flow method
6054774, Mar 22 1994 Kabushiki Kaisha Toshiba Thin type semiconductor package
6060332, Oct 26 1995 Gemplus Hybrid device with flush-mounted contacts for generating acoustic signals, and method for making same
6065681, Jan 29 1997 ORGA Kartensysteme GmbH Method of producing data carriers
6086740, Oct 29 1998 CALIPER TECHNOLOGIES CORP Multiplexed microfluidic devices and systems
6097605, Nov 25 1995 Stocko Metallwaren Fabriken Henkels und Sohn GmbH & Co. Contacting unit for card-shaped support elements for electronic components
6102743, Jul 25 1997 Nokia Mobile Phones Ltd. Data card connector
6141210, Jul 23 1993 Kabushiki Kaisha Toshiba External storage device
6151511, Mar 01 1996 Adapter for integrated circuit cards for cellular telephones
6188580, Aug 08 1996 Infineon Technologies AG Smart card and semiconductor chip for use in a smart card
6191951, Mar 03 1997 Siemens Aktiengesellschaft Smart card module and smart card including a smart card module
6209790, Mar 31 1995 Infineon Technologies AG Data medium in card form and lead frame for use in such a data medium
6213403, Sep 10 1999 ITT Manufacturing Enterprises, Inc. IC card with fingerprint sensor
6222737, Apr 23 1999 HANGER SOLUTIONS, LLC Universal package and method of forming the same
6241557, Mar 26 1999 Amphenol-Tuchel Electronics GmbH Smart card connector
6255038, Jun 10 1996 DMG TECHNOLOGIES, INC Process for modulating interferometric lithography patterns to record selected discrete patterns in photoresist
6274926, Apr 28 1993 Kabushiki Kaisha Toshiba Plate-shaped external storage device and method of producing the same
6281577, Jun 28 1996 PAC Tech - Packaging Technologies GmbH Chips arranged in plurality of planes and electrically connected to one another
6292490, Jan 14 1998 SKYSTREAM NETWORKS INC Receipts and dispatch timing of transport packets in a video program bearing stream remultiplexer
6312304, Dec 15 1998 E Ink Corporation Assembly of microencapsulated electronic displays
6315205, Jul 06 1999 ITT Manufacturing Enterprises, Inc. Adaptor for smart card
6329228, Apr 28 1999 CITIZEN WATCH CO , LTD Semiconductor device and method of fabricating the same
6333989, Mar 29 1999 Activcard Ireland Limited Contact imaging device
6338967, Jul 11 1998 Solid solventless protein assay with standards
6344162, Jul 10 1998 APIC Yamada Corporation Method of manufacturing semiconductor devices and resin molding machine
6368558, Mar 21 2000 Board of Trustees of the University of Illinois, The Colorimetric artificial nose having an array of dyes and method for artificial olfaction
6369795, Apr 01 1998 UNIFY GMBH & CO KG Mousepad telephone
6378774, Nov 14 1997 Toppan Printing Co., Ltd. IC module and smart card
6398114, Aug 02 1993 Dai Nippon Printing Co., Ltd. Sheet-framed IC carrier, method for producing the same, and IC carrier case
6409089, Dec 10 1997 INTERDIGITAL CE PATENT HOLDINGS Method for protecting the audio/visual data across the NRSS interface
6443361, May 28 1999 Stocko Contact GmbH & Co. KG PC-card chip-card reader
6460772, Sep 01 1998 Intertex Data AB PCMCIA smart card reader
6492182, Jul 28 1999 Research Foundation of State University of New York, The Microsensor arrays and method of using same for detecting analytes
6492718, Dec 20 1999 Kabushiki Kaisha Toshiba Stacked semiconductor device and semiconductor system
6512580, Oct 27 1999 VERIFICATION TECHNOLOGIES, INC Method and apparatus for portable product authentication
6513718, May 06 1999 Oberthur Card Systems SAS Method for mounting a microcircuit in a cavity of a card forming a support and resulting card
6548888, May 15 1998 Gemplus Integrated circuit card comprising an interface terminal strip and method for making same
6552910, Jun 28 2000 U S BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT Stacked-die assemblies with a plurality of microelectronic devices and methods of manufacture
6561432, Jan 19 1999 Giesecke & Devrient GmbH Portable data support with a break-off mini-chip card
6576992, Oct 26 2001 TAMIRAS PER PTE LTD , LLC Chip scale stacking system and method
6581840, Jun 23 1997 Dai Nippon Printing Co., Ltd. Sheet-framed IC carrier and method for producing the same
6592031, Dec 04 1998 Stocko Contact GmbH & Co. KG Authentication system for PC cards
6592044, May 15 2000 Privasys, Inc Anonymous electronic card for generating personal coupons useful in commercial and security transactions
6594361, Aug 19 1994 THOMSON LICENSING S A High speed signal processing smart card
6600222, Jul 17 2002 Intel Corporation Stacked microelectronic packages
6613610, Jul 18 2000 Sony Corporation Image display unit and method of producing image display unit
6641049, Aug 31 2000 QUADNOVATION, INC Integrated circuit card with multiple integral electronic modules
6646957, Feb 16 2000 Asulab S.A. Telephone watch including a SIM card in its housing
6663831, Apr 04 2001 ABBOTT RAPID DIAGNOSTICS INTERNATIONAL UNLIMITED COMPANY "One-device" system for testing constituents in fluids
6673630, Feb 23 2000 Siemens Healthcare Diagnostics Inc Method and apparatus for producing visual results using colorimetric strips
6681616, Feb 23 2000 Caliper Life Sciences, Inc Microfluidic viscometer
6698378, Sep 12 2000 Sud-Chemie Inc.; SUD-CHEMIE PERFORMANCE PACKAGING, INC Irreversible humidity indicator cards
6705520, Nov 15 1999 C-SAM, INC Point of sale adapter for electronic transaction device
6719206, Nov 09 1998 On Track Innovations Ltd. Data transaction card and method of manufacture thereof
6762537, Dec 02 1998 Seiko Epson Corporation Piezoelectric device and method for manufacture thereof
6764005, Nov 04 1994 CASCADES VENTURES, INC Universal credit card apparatus and method
6779115, Feb 18 2000 Kioba Processing, LLC Portable device using a smart card to receive and decrypt digital data
6811082, Sep 18 2001 Advanced magnetic stripe bridge (AMSB)
6826185, May 14 1999 TELECOM ITALIA LAB S P A Encoded audio-video streams remultiplexing equipment
6836138, Jun 20 2003 Samsung Electronics Co., Ltd. Module having test architecture for facilitating the testing of ball grid array packages, and test method using the same
6848617, Jan 27 1998 Infineon Technologies AG Smart card module for biometric sensors
6853087, Sep 19 2000 NANOPIERCE TECHNOLOGIES, INC ; NANOPIERCE CONNECTION SYSTEMS, INC Component and antennae assembly in radio frequency identification devices
6882541, Mar 27 2003 Denso Corporation IC card
6896189, May 03 2000 GEMALTO SA Card comprising electrical contacts
6916207, Jul 28 2000 Pace PLC Adaptor to allow apparatus with non-scart connectors to connectors to connect to apparatus with scart connectors
6922780, Aug 08 2000 The DIRECTV Group, Inc. Dual chip smart card and method for using same
6974343, Sep 30 2003 Hon Hai Precision Ind. Co., Ltd. SIM card connector
7019981, Aug 10 2001 Infineon Technologies AG Making contact with semiconductor chips in chip cards
7023706, Mar 01 2002 Renesas Technology Corporation Semiconductor device and manufacturing the same
7051128, Feb 21 2002 Sony Corporation System and method for data bus communication system between external card connection device and host device
7051929, Oct 18 2004 Secure credit card having daily changed security number
7062584, Jul 15 1999 Thomson Licensing Method and apparatus for supporting two different types of integrated circuit cards with a single connector
7063267, Sep 26 2003 Kabushiki Kaisha Toshiba Portable electronic device
7101660, Oct 30 2000 X-BODY, INC Method for producing a colorimetric resonant reflection biosensor on rigid surfaces
7136514, Feb 14 2002 Method for authenticating an individual by use of fingerprint data
7140550, Jul 30 2004 Diebold Nixdorf, Incorporated; DIEBOLD SELF-SERVICE SYSTEMS DIVISION OF DIEBOLD NIXDORF, INCORPORATED Multi-account card with magnetic stripe data and electronic ink display being changeable to correspond to a selected account
7184093, May 20 2002 Thomson Licensing Video image formatting technique
7225537, Jan 27 2005 CARDXX, INC Method for making memory cards and similar devices using isotropic thermoset materials with high quality exterior surfaces
7252242, Feb 04 2005 Method for providing additional service based on dual UICC
7294918, Apr 02 2001 Renesas Electronics Corporation; NEC Electronics Corporation Memory card with connecting portions for connection to an adapter
7305535, Apr 17 2003 SanDisk Technologies LLC Memory cards including a standard security function
7350714, Aug 04 2000 SanDisk Technologies LLC Use of small electronic circuit cards with different interfaces in an electronic system
7384294, Nov 24 2005 J.S.T. Mfg. Co., Ltd. Connector for SIM
7416132, Jul 17 2003 SanDisk Technologies LLC Memory card with and without enclosure
7417310, Nov 02 2006 TAMIRAS PER PTE LTD , LLC Circuit module having force resistant construction
7424136, Oct 18 2006 Apple Inc Finger sensing with enhanced mounting and associated methods
7442050, Aug 29 2005 NETLIST, INC Circuit card with flexible connection for memory module with heat spreader
7469420, May 21 2002 INTERDIGITAL MADISON PATENT HOLDINGS Key transport tamper protection
7485501, Nov 02 2005 SanDisk Technologies LLC Method of manufacturing flash memory cards
7503899, Sep 26 2005 Femtek LLC Digital type color comparisons in vaginal moisture pH determination
7508942, Nov 05 2002 Sony Corporation; Sony Electronics Inc. Multi-process descrambler
7520052, Jun 27 2005 Texas Instruments Incorporated Method of manufacturing a semiconductor device
7530495, Nov 04 1994 CASCADES VENTURES, INC Universal credit card apparatus and method
7552876, Jan 25 2000 Renesas Electronics Corporation; NEC Electronics Corporation IC card
7559469, May 24 2002 NTT DoCoMo, Inc Chip card of reduced size with backward compatibility and adapter for a reduced size chip card
7577846, Oct 04 2000 Nagravision SA Mechanism of matching between a receiver and a security module
7605453, Aug 11 2005 Infineon Technologies AG Chip module and chip card
7647641, Dec 23 2003 VIACCESS Method and system for conditional access applied to protection of content
7659606, Dec 21 2005 STOCKO CONTACT GMBH & KG Contacting unit
7673805, Mar 11 2004 JCB CO , LTD ; MAXELL SEIKI, LTD Mini card adapter
7753266, Oct 16 2000 HARRIS, SCOTT C ; HARRIS, SCOTT; LOSCH Intelligent credit card system
7784693, Jun 05 2006 Silicon Storage Technology, Inc Assembly of SIM card and RFID antenna
7793848, Nov 30 2004 SEMICONDUCTOR ENERGY LABORATORY CO , LTD Semiconductor device and manufacturing method thereof
7810718, May 12 2005 Cubic Corporation Variable thickness data card body
7828207, Nov 04 1994 Technology Licensing Corporation Universal credit card apparatus and method
7861029, Apr 23 2007 Polaris Innovations Limited Memory module having buffer and memory ranks addressable by respective selection signal
7864540, Jul 17 2003 SanDisk Technologies LLC Peripheral card with sloped edges
7866996, Oct 19 2006 Western Digital Israel Ltd Internal UFD
7871007, Apr 03 2003 IDEMIA FRANCE Microcircuit card attached to an adapter base, card base and manufacturing method
7871011, Jul 13 2004 GEMALTO SA Mini-plug SIM card with improved positioning capability
7913916, Feb 17 2005 Koninklijke Philips Electronics N.V. Smartcard and a method of operating a smartcard
7922097, Sep 07 2007 Panasonic Corporation SIM card IC module and SIM card
7925016, Mar 30 1999 Sony Corporation; Sony Electronics Inc. Method and apparatus for descrambling content
7940249, Nov 01 2005 Apple Inc Devices using a metal layer with an array of vias to reduce degradation
7954705, May 09 2005 DYNAMICS INC Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card
8009432, Apr 27 2007 AVARY HOLDING SHENZHEN CO , LIMITED Retaining apparatus for a flexible printed circuit board
8022526, Aug 07 2009 SERIES 115 OF ALLIED SECURITY TRUST I Distributed computing
8064205, May 19 2008 Dell Products, LP Storage devices including different sets of contacts
8072764, Mar 09 2009 Apple Inc. Multi-part substrate assemblies for low profile portable electronic devices
8079528, Jan 10 2007 Taiwan Semiconductor Manufacturing Co., Ltd. Input/output pads placement for a smart card chip
8083150, Sep 26 2005 Panasonic Corporation Noncontact information storage medium and method for manufacturing same
8097939, Dec 26 2007 TOSHIBA MEMORY CORPORATION Semiconductor memory card
8111566, Nov 16 2007 GOOGLE LLC Optimal channel design for memory devices for providing a high-speed memory interface
8143720, Feb 06 2007 Rambus Inc. Semiconductor module with micro-buffers
8317103, Jun 23 2010 FiTeq Method for broadcasting a magnetic stripe data packet from an electronic smart card
8395465, Sep 17 2010 Apple Inc. Cover for an electric device
8422263, Jun 05 2009 Longitude Licensing Limited Load reduced memory module and memory system including the same
8448867, Dec 19 2008 Symbol Technologies, LLC Illumination apparatus for an imaging-based bar code system
8451122, Aug 08 2008 ICASHE, INC Smartcard performance enhancement circuits and systems
8456850, Dec 07 2009 Samsung Electronics Co., Ltd. Memory cards and electronic machines
8456852, Dec 28 2009 Hong Fu Jin Precision Industry (ShenZhen) Co., Ltd.; Hon Hai Precision Industry Co., Ltd. Card assembly and electronic device thereof
8480002, Mar 26 2005 DISCOVER FINANICAL SERVICES; Discover Financial Services Conducting a transaction with an electronic card
8490127, Dec 31 2007 VIDEOLABS, INC Distributed TV access system
8500019, Mar 26 2005 DISCOVER FINANICAL SERVICES; Discover Financial Services Electronic cards and methods for making same
8502735, Nov 18 2009 BAE SYSTEMS SPACE & MISSION SYSTEMS INC Antenna system with integrated circuit package integrated radiators
8505064, Jan 29 2004 NGNA, LLC Method and system of providing signals
8608082, Jul 20 2010 IDEMIA FRANCE Microcircuit device including means for amplifying the gain of an antenna
8618669, Jan 09 2008 IBIDEN CO , LTD Combination substrate
8647110, Oct 28 2009 Samsung Electronics Co., Ltd. Apparatuses and methods for fabricating semiconductor packages
8649820, Nov 07 2011 BlackBerry Limited Universal integrated circuit card apparatus and related methods
8654535, Mar 08 2012 PROCONN TECHNOLOGY CO., LTD. Card holder
8690283, Oct 20 2009 Western Digital Israel Ltd Method and system for printing graphical content onto a plurality of memory devices and for providing a visually distinguishable memory device
8700833, Aug 17 2000 SanDisk Technologies LLC Data storage device with host-accessible indicator
8710591, Oct 27 2009 Samsung Electronics Co., Ltd. Semiconductor chip, stack module, and memory card
8730009, Jun 08 2010 Vodafone Holding GmbH Smart card and mobile communication device comprising the smart card
8746579, Mar 02 2010 Dynamics Inc. Systems and methods for detection mechanisms for magnetic cards and devices
8814053, Aug 08 2008 ICASHE, INC Mobile payment device with small inductive device powered by a host device
8819818, Feb 09 2012 Harris Corporation Dynamic computer network with variable identity parameters
8936199, Apr 13 2012 BlackBerry Limited UICC apparatus and related methods
9058897, Dec 30 2011 Samsung Electronics Co., Ltd. Semiconductor memory device storing memory characteristic information, memory module and memory system having the same, and operating method thereof
9093277, Feb 06 2013 Mitsubishi Electric Corporation Semiconductor device and method of manufacturing the same
9806017, Apr 21 2011 Tessera, Inc. Flip-chip, face-up and face-down centerbond memory wirebond assemblies
9815057, Nov 14 2006 HandyLab, Inc. Microfluidic cartridge and method of making same
9880137, Sep 04 2008 The Board of Trustees of the University of Illinois Colorimetric sensor arrays based on nanoporous pigments
9881564, Nov 20 2001 E Ink Corporation Electro-optic displays with reduced remnant voltage
9895692, Jan 29 2010 REVVITY HEALTH SCIENCES, INC Sample-to-answer microfluidic cartridge
9956562, Apr 05 2005 Zeon Corporation Devices and method for enrichment and alteration of cells and other particles
20010011944,
20010011962,
20010012366,
20010018984,
20010050846,
20020003168,
20020014535,
20020115224,
20020137502,
20020145049,
20020152048,
20030002577,
20030059047,
20030085287,
20030091160,
20030129085,
20030153356,
20030163508,
20030179910,
20030194091,
20030213849,
20030221066,
20030224553,
20040001591,
20040053290,
20040124246,
20040129785,
20040143716,
20040152392,
20040166140,
20040171192,
20040181800,
20040189311,
20040225918,
20040256150,
20040258762,
20040260823,
20050005287,
20050023361,
20050033688,
20050058574,
20050061884,
20050148121,
20050158781,
20050197169,
20050212657,
20050212690,
20050231921,
20050232471,
20050247784,
20050252978,
20060026295,
20060029522,
20060043202,
20060053345,
20060057039,
20060058065,
20060059391,
20060072293,
20060097059,
20060125067,
20060131396,
20060133051,
20060155913,
20060198238,
20060208077,
20060228256,
20060261454,
20060283946,
20060286847,
20070009386,
20070020764,
20070028260,
20070033490,
20070060198,
20070067810,
20070067820,
20070117550,
20070121008,
20070125855,
20070127185,
20070138301,
20070143784,
20070146542,
20070153487,
20070172388,
20070176622,
20070235545,
20070237243,
20070246536,
20070250872,
20070262156,
20070266182,
20080020800,
20080031449,
20080041952,
20080056948,
20080062066,
20080079565,
20080083831,
20080094788,
20080096317,
20080099559,
20080107565,
20080122894,
20080135626,
20080137278,
20080163290,
20080165962,
20080174408,
20080211074,
20080211302,
20080223937,
20080257967,
20080257968,
20080262213,
20080263623,
20080279379,
20080314983,
20090011538,
20090032593,
20090040695,
20090057417,
20090061450,
20090086657,
20090140415,
20090144456,
20090153163,
20090156254,
20090199283,
20090244858,
20090275170,
20090309952,
20100006322,
20100013887,
20100019038,
20100025480,
20100072284,
20100097080,
20100117800,
20100136816,
20100138857,
20100165589,
20100169940,
20100176207,
20100244166,
20100272257,
20100302516,
20100303687,
20100318627,
20100327467,
20110003303,
20110010734,
20110028184,
20110080331,
20110119487,
20110138088,
20110170750,
20110221385,
20110259966,
20110315779,
20120007096,
20120018522,
20120028342,
20120048948,
20120105081,
20120138690,
20120168517,
20120177543,
20120193435,
20120231650,
20120248201,
20120267438,
20120287587,
20120289196,
20120292395,
20130008968,
20130015441,
20130112757,
20130130262,
20130134227,
20130161390,
20130175346,
20130185566,
20130193591,
20130194071,
20130207781,
20130277434,
20130287267,
20130320088,
20130334320,
20130337686,
20140021264,
20140042230,
20140061316,
20140138449,
20140282685,
20140282808,
20140347818,
20150016607,
20150016608,
20150113585,
20150143105,
20150154998,
20150321193,
20150352549,
20160022570,
20160117714,
20160217087,
20160250393,
20160365140,
20170010639,
20180027288,
CA2318936,
CN101005563,
CN101267532,
CN102164320,
CN102164329,
CN1659819,
D254687, Jan 25 1979 McDonnell Douglas Corporation Biochemical card for use with an automated microbial identification machine
D258281, Sep 23 1977 ADVANCED INTERCONNECTIONS CORPORATION,A CORP OF RHODE ISLAND Panel board for integrated circuit packages
D267094, Apr 12 1979 Sharp Corporation Magnetic card for microwave oven
D284215, May 03 1983 Warner-Lambert Company Specimen-collection pad for occult-blood detection
D302294, Oct 03 1986 Roche Diagnostics Corporation Reagent cartridge for blood analysis
D304826, May 18 1988 Kabushiki Kaisha Toshiba Integrated circuit card with magnetic reader strip and keyboard and display
D305023, Sep 25 1986 Kabushiki Kaisha Toshiba Integrated circuit card with magnetic reading strip and keyboard and display
D327883, Feb 09 1990 Gemplus Card International Connecting terminal for chip cards
D328599, Apr 10 1990 Gemplus Card International Connecting terminal for chip cards
D340289, Jan 30 1992 Diagnostic testing material
D342728, Feb 02 1989 Gemplus Card International Connecting terminal for chip cards
D344502, Feb 02 1989 Gemplus Card International Connecting terminal for chip cards
D353135, Nov 27 1991 Gemplus Card International Connecting terminal for chip cards
D353136, Mar 12 1992 Gemplus Card International Connecting terminal for chip cards
D357909, Jul 11 1991 Gemplus Card International Connecting terminal for chip cards
D358142, Mar 02 1992 Gemplus Card International Connecting terminal for chip cards
D375303, Nov 30 1994 SOLAIC (societe anonyme) Smart card with plural external contact regions
D382647, Jan 17 1996 Biomerieux, Inc Biochemical test card
D387746, May 29 1996 Kabushiki Kaisha Toshiba IC module
D387747, May 29 1996 Kabushiki Kaisha Toshiba IC module
D388066, May 29 1996 Kabushiki Kaisha Toshiba IC module
D389130, May 29 1996 Kabushiki Kaisha Toshiba IC module
D407392, Jun 23 1997 Infineon Technologies AG Chipcard
D420452, May 16 1998 Cytocell Limited Carrier for samples or reagents
D420745, May 16 1998 Cytocell Limited Carrier for samples or reagents
D425519, Jun 19 1995 Gemplus Connecting terminal for chip cards
D434396, Jan 22 1999 Kabushiki Kaisha Toshiba IC card
D434418, Apr 06 1999 Seiko Epson Corporation IC module
D452864, Jun 12 2000 SanDisk Technologies LLC Electronic memory card
D456414, Jun 19 1995 Gemplus Connecting terminal for chip cards
D456910, May 09 2001 Lifescan, Inc Analyte test strip
D461251, Oct 25 1999 Diagnostic test card
D461561, Oct 25 1999 Diagnostic test card
D461906, Oct 25 1999 Diagnostic test card
D462125, Oct 25 1999 Diagnostic test card
D466093, Apr 27 2001 Taiyo Yuden Co., Ltd.; TAIYO YUDEN CO , LTD Hybird integrated circuit board
D487747, Jan 08 2003 C-One Technology Corporation; Pretec Electronics Corporation Removable electronic card
D491276, Dec 09 2002 Plastic diagnostic card
D491951, Dec 13 2002 C-One Technology Corp.; Pretec Electronics Corp. Removable electronic card
D492688, Dec 09 2002 SanDisk Technologies LLC Memory card
D493798, Oct 13 2003 C-One Technology Corporation Memory card
D530021, Jun 24 2005 Nuclea Biomarkers LLC Antibody protein analysis chip
54610,
D571810, Jun 20 2006 Kabushiki Kaisha Toshiba Module with built-in integrated circuits for use with IC cards
D588133, Dec 17 2007 Panasonic Corporation IC memory card
D588134, Jan 11 2008 Panasonic Corporation IC memory card
D605304, May 23 2008 Horiba, LTD Blood testing chip
D643040, Oct 26 2010 Hon Hai Precision Ind. Co., Ltd. Electrical card
D667442, Sep 12 2011 Microsoft Corporation Display screen with icon
D669478, Jan 13 2012 BlackBerry Limited Device smart card
D669479, Jan 13 2012 BlackBerry Limited Device smart card
D669594, Aug 31 2010 CANON U S A , INC Cartridge assembly
D681640, Dec 03 2010 Sony Computer Entertainment Inc Storage medium
D685375, May 18 2012 BIO LOGIS GENETIC INFORMATION MANAGEMENT GMBH Memory or chip card
D686214, Jul 28 2011 ORANGEHOOK, INC ; SPRING GROVE FINANCE, S A Smartcard with iChip contact pad
D695636, Aug 27 2012 Dynamics Inc.; DYNAMICS INC Interactive electronic card with display and buttons
D701864, Apr 23 2012 BlackBerry Limited UICC apparatus
D702240, Apr 13 2012 Malikie Innovations Limited UICC apparatus
D702241, Apr 23 2012 BlackBerry Limited UICC apparatus
D703208, Apr 13 2012 Malikie Innovations Limited UICC apparatus
D707682, Dec 05 2012 SMK Corporation Memory card
D715854, Aug 12 2013 Visa International Service Association Card
D724660, Aug 12 2013 Visa International Service Association Card
D725187, Aug 12 2013 Visa International Service Association Card
D729808, Mar 13 2013 NAGRASTAR, LLC Smart card interface
D755741, Feb 18 2015 DEUTSCHE BANK AG NEW YORK BRANCH, AS COLLATERAL AGENT Power device package
D757015, Jul 01 2014 GOOGLE LLC Electronic module
D758372, Mar 13 2013 NAGRASTAR, LLC Smart card interface
D759022, Mar 13 2013 NAGRASTAR, LLC Smart card interface
D764424, May 15 2014 Kioxia Corporation Substrate for an electronic circuit
D775093, Oct 17 2013 Vicor Corporation Electric terminal
D778850, May 15 2014 Kioxia Corporation Substrate for an electronic circuit
D778851, May 15 2014 Kioxia Corporation Substrate for an electronic circuit
D778852, May 15 2014 Kioxia Corporation Substrate for an electronic circuit
D792410, Mar 13 2013 NAGRASTAR LLC Smart card interface
D792411, Mar 13 2013 NAGRASTAR LLC Smart card interface
EP740478,
EP1463322,
EP1662361,
EP1765013,
EP2204997,
EP2407916,
EP2541959,
KR3004415620000,
KR3006175300000,
KR3006364910000,
KR3006364910001,
TW201246815,
TW201247009,
TW201301832,
WO2007072211,
WO2011120901,
//
Executed onAssignorAssigneeConveyanceFrameReelDoc
Sep 29 2014NAGRASTAR, LLC(assignment on the face of the patent)
Aug 03 2016ECHOSTAR TECHNOLOGIES L L C NAGRASTAR, LLCASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0397210721 pdf
Date Maintenance Fee Events
Feb 09 2022M1551: Payment of Maintenance Fee, 4th Year, Large Entity.


Date Maintenance Schedule
Sep 04 20214 years fee payment window open
Mar 04 20226 months grace period start (w surcharge)
Sep 04 2022patent expiry (for year 4)
Sep 04 20242 years to revive unintentionally abandoned end. (for year 4)
Sep 04 20258 years fee payment window open
Mar 04 20266 months grace period start (w surcharge)
Sep 04 2026patent expiry (for year 8)
Sep 04 20282 years to revive unintentionally abandoned end. (for year 8)
Sep 04 202912 years fee payment window open
Mar 04 20306 months grace period start (w surcharge)
Sep 04 2030patent expiry (for year 12)
Sep 04 20322 years to revive unintentionally abandoned end. (for year 12)